πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Big bad decryption bug in OpenSSL – but no cause for alarm ⚠

The buggy code's in there, alright. Fortunately, it's hard to get OpenSSL to use it even if you want to, which mitigates the risk.

πŸ“– Read

via "Naked Security".
β€Ό CVE-2021-39167 β€Ό

OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-39168 β€Ό

OpenZepplin is a library for smart contract development. In affected versions a vulnerability in TimelockController allowed an actor with the executor role to escalate privileges. Further details about the vulnerability will be disclosed at a later date. As a workaround revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-40142 β€Ό

In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service (DoS) by sending carefully crafted messages that lead to Access of a Memory Location After the End of a Buffer.

πŸ“– Read

via "National Vulnerability Database".
❌ β€˜Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast ❌

Splunk’s Ryan Kovar discusses the rise in supply-chain attacks a la Kaseya & how to get ahead of encryption leaving your business a pile of broken shells. 

πŸ“– Read

via "Threat Post".
❌ Top Strategies That Define the Success of a Modern Vulnerability Management Program ❌

Modern vulnerability management programs require a strategy that defines what success means for your organization’s cybersecurity goals. By incorporating a few simple cyber hygiene routines to your daily security routine, you’ll set up your IT teams to be better equipped to steer off cyberattacks.

πŸ“– Read

via "Threat Post".
β€Ό CVE-2021-39169 β€Ό

Misskey is a decentralized microblogging platform. In versions of Misskey prior to 12.51.0, malicious actors can use the web client built-in dialog to display a malicious string, leading to cross-site scripting (XSS). XSS could compromise the API request token. This issue has been fixed in version 12.51.0. There are no known workarounds aside from upgrading.

πŸ“– Read

via "National Vulnerability Database".
❌ Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor ❌

The cybercriminal group, active since late 2019, has closed its doors and released the key to unlocking victims’ files on its dark web portal.

πŸ“– Read

via "Threat Post".
🦿 "Intruders" in the cloud: Microsoft warns "thousands" of customers about potential exposure 🦿

On Thursday, the company sent warnings to "thousands" of its cloud computing customers, explaining that "intruders" could have access to Microsoft Azure's Cosmos DB databases, according to Reuters.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-40153 β€Ό

squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.

πŸ“– Read

via "National Vulnerability Database".
❌ Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover ❌

It's unclear if Microsoft customers were breached during the months-long period where the #ChaosDB bug in Jupyter Notebooks was exploitable.

πŸ“– Read

via "Threat Post".
πŸ” Friday Five 8/27 πŸ”

Tech companies pledge billions to bolster security, a ransomware group shuts down, and the top data breach culprits - catch up on the infosec news of the week with the Friday Five!

πŸ“– Read

via "".
❌ FIN8 Targets US Bank With New β€˜Sardonic’ Backdoor ❌

The latest refinement of the APT's BadHatch backdoor can leverage new malware on the fly without redeployment, making it potent and nimble.

πŸ“– Read

via "Threat Post".
🦿 Top 10 tech and health jobs with the best pay and growth potential 🦿

A new analysis shows that infosec analysts, sysadmins and network architects will see the most growth over the next decade.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-36530 β€Ό

ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-36531 β€Ό

ngiflib 0.4 has a heap overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode, GetByte() reads memory buffer without checking the boundary.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-29744 β€Ό

IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 201694.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-23434 β€Ό

This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.

πŸ“– Read

via "National Vulnerability Database".
🦿 Ransomware demands and payments skyrocket 🦿

According to a ransomware report, the average ransom payment in the first half of 2021 jumped to $570,000. Learn more in TechRepublic's Karen Roby interview with writer Lance Whitney.

πŸ“– Read

via "Tech Republic".
🦿 How malicious Android apps use social engineering tactics to access Facebook accounts 🦿

Learn how Android users can protect themselves against such malicious apps.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2021-28695 β€Ό

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

πŸ“– Read

via "National Vulnerability Database".